Skip to content

[WIP] Security process(es) doc#8952

Open
dims wants to merge 4 commits intokubernetes:mainfrom
dims:security-processes-doc
Open

[WIP] Security process(es) doc#8952
dims wants to merge 4 commits intokubernetes:mainfrom
dims:security-processes-doc

Conversation

@dims
Copy link
Copy Markdown
Member

@dims dims commented Apr 22, 2026

Which issue(s) this PR fixes:

Fixes #

@k8s-ci-robot k8s-ci-robot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Apr 22, 2026
@k8s-ci-robot k8s-ci-robot requested a review from kaslin April 22, 2026 14:35
@k8s-ci-robot k8s-ci-robot added the area/contributor-guide Issues or PRs related to the contributor guide label Apr 22, 2026
@k8s-ci-robot k8s-ci-robot requested a review from mfahlandt April 22, 2026 14:35
@k8s-ci-robot k8s-ci-robot added sig/contributor-experience Categorizes an issue or PR as relevant to SIG Contributor Experience. size/L Denotes a PR that changes 100-499 lines, ignoring generated files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. labels Apr 22, 2026
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
@dims dims force-pushed the security-processes-doc branch from 6155765 to 92efa72 Compare April 22, 2026 14:37
@dims
Copy link
Copy Markdown
Member Author

dims commented Apr 22, 2026

cc @PushkarJ

Comment thread contributors/guide/security.md
Comment thread contributors/guide/security.md Outdated

The properties we defend — authentication, authorization, admission, tenant
isolation, secret handling, component integrity — assume a cluster where
the operator has applied documented secure defaults. Operator-chosen
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This bit will open up a question of "which documented secure defaults we mean", as distros often have different ideas of secure defaults. I can initially think of a couple of options here

  • Pick a set of defaults to reference (e.g. Kubeadm defaults) I would lean against saying "Kubernetes component defaults" here as some of those are not what people run in production clusters.
  • Exclude anything that can be configured (i.e. there is an option of secure configuration available) from Kubernetes CVEs. so that way a valid report might be "this is insecure and there's no configuration option to make it secure" but "hey out of the box this is insecure" would not be.

Honestly that last one might make more sense. Realistically out of the box, Kubernetes is not a secure enterprise platform, it needs external software and/or additional configuration (e.g. no default netpol, anyone who can create pods gets root on any node)

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would like some SRC input on this for sure :)

Comment thread contributors/guide/security.md Outdated
be reproduced.**
- **Compliance-framework findings that do not describe a concrete
flaw.** That conversation belongs between the compliance vendor and
the operator, not with the SRC.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we want an exclusion for "things we already know about" here, to avoid people re-discovering old issues and thinking they're a new finding. For this sources like the results of 3rd party audit would be a good starting point, also there's also things like open GH issues (e.g. 18982) and some things like https://kinvolk.io/blog/2019/02/abusing-kubernetes-apiserver-proxying which don't even have a GH issue.

Ideally I guess it'd be nice to have a list of all of those in one place, but that's not something that exists at the moment(AFAIK)

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you please suggest some language i can incorporate @raesene ? thanks!

Comment thread contributors/guide/security.md
Comment thread contributors/guide/security.md
Copy link
Copy Markdown
Member

@PushkarJ PushkarJ left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dims Thank you for compiling this. Overall I like the intent of the document and most of the content. Left several suggestions and asked some clarifying questions.

Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md
Comment thread contributors/guide/security.md
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md
Comment thread contributors/guide/security.md
Comment thread contributors/guide/security.md
dims and others added 2 commits April 24, 2026 15:06
Co-authored-by: Pushkar Joglekar <3390906+PushkarJ@users.noreply.github.com>
Co-authored-by: Pushkar Joglekar <3390906+PushkarJ@users.noreply.github.com>
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md Outdated
Comment thread contributors/guide/security.md
Co-authored-by: Pushkar Joglekar <3390906+PushkarJ@users.noreply.github.com>
Copy link
Copy Markdown
Member

@PushkarJ PushkarJ left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for putting this together. This doc compiles / summarizes text spread out across several different places with appropriate links. I urge all my fellow maintainers to use this as guidance to decide what is worth their time when it comes to vulnerability related requests as well as use it as a shield when urgent fixes are requested with no regard for precious maintainer time.

Optionally: It would be great to get a review from @kubernetes/security-response-committee and @kubernetes/sig-contributor-experience to ensure nothing is accidentally missed or mis-represented.

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Apr 24, 2026
@k8s-ci-robot
Copy link
Copy Markdown
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dims, PushkarJ
Once this PR has been reviewed and has the lgtm label, please assign mrbobbytables for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

operational model.**
- **Weak algorithms, missing headers, or deprecated settings an
operator opted into by configuration.**
- **AI-generated reports whose code paths, symbols, or traces cannot
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

does it matter the origin, if is not reproducible it does not really matter if is AI generated or manually ?

I think that this is a more call of warning that "AI automated report must be curated and validated by the reporter"

The Kubernetes project is a CVE Numbering Authority for components in
the `kubernetes/kubernetes` repository. CVEs in upstream dependencies
(Go, containerd, etcd, runc, kernel) are the responsibility of their
respective CNAs. CVEs in out-of-tree Kubernetes SIG projects are
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

does this really mean "out-of-tree Kubernetes SIG projects"? or not kubernetes/kubernetes and SIG projects? because all kubernetes sig projects are out of tree, unless we consider the ones that we revendor in kubernetes/kubernetes 🤔

@aojea
Copy link
Copy Markdown
Member

aojea commented Apr 27, 2026

+1 some non-binding feedback.
I think the document can be simplified , it looks to me that some content is duplicated and some areas require a lot of kubernetes community knowledge, if the audience is for new or not core contributors unfamiliar with the release process or non-contributors there are parts that may not understand, a intro with the description of core, non-core sigs and explaining those are github repositories may help? then just reference those definitions?
+1 on the message of "don't spam us with AI automated generated reports" that is expressed in several places but I wonder if we can just aggregate all those calls in a Warning Note in a visible part of the doc.

be reproduced.**
- **Compliance-framework findings that do not describe a concrete
flaw.** That conversation belongs between the compliance vendor, distributor and operator, not with the SRC.

Copy link
Copy Markdown

@raesene raesene Apr 28, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- **Issues relating to known Kubernetes project architectural choices and accepted risks. Anything that's already been noted in a existing security audit or public blog which the project has chosen not to fix by issuing a patch.

The comment's dropped off the review list but this was some possible wording addressing the idea that we won't issue CVEs for things we already know about. The idea here is to avoid submissions (especially AI gen ones) that are just based on existing known issues (e.g. the unclosed ones from third party audits, the unpatchable CVEs or things like the kinvolk pod proxy attack)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/contributor-guide Issues or PRs related to the contributor guide cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. lgtm "Looks good to me", indicates that a PR is ready to be merged. sig/contributor-experience Categorizes an issue or PR as relevant to SIG Contributor Experience. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants